Safety is the most important requirement of home for people. With the development of IT technology, network and automatic control technology, a remote home security monitoring and alarming system becomes more and more practicable today. By combining wireless sensor network(WSN) and GSM technology, this paper designs a low-power consumption remote home security monitoring and alarming system that can detect the theft, leaking of raw gas and fire, and send alarm message to the house owner’s mobile phone .Wireless sensor network is composed of a large amount of miniature self-organizing wireless sensor nodes. By combining three kinds of technology such as sensor, micro mechatronics and wireless communication, WSN can detect, collect and deal with the object information in its covering area, and send data to the observer. In a word, WSN technology has the advantages of wide covering area, able to remote monitoring, high monitoring precision, fast network establishment and reasonable cost . GSM network has the advantages of mature technology, wide covering area, long communication distance, and sound communication effect and so on. The remote home security system presented in this paper combines so many advantages of WSN and GSM. Firstly, wherever the users are, once some dangerous instance happens in home, such as gas leaking or thief intruding, this system can send alarm short message to the users through GSM network immediately, informing people the possible dangerous circumstances in home. Secondly, the wireless sensor network established in home has the features of ease establishment, without use of cable, and low-power consumption. Intelligent home, also known as the smart residential home, is moving towards the wireless remote control, multi-media control, and high-speed data transmission. The key technology of intelligent home is compatible to household controllers and it can also meet the transmission requirements through home networking . At present, lots of integrated transport network is based on comprehensive wiring technology , limiting the system to special places, and higher cost. Currently, researches on the wireless intelligent home security surveillance system is becoming a hotspot due to its flexibility and convenience. At present, the application of intelligent home wireless communication technologies mainly include: IrDA infrared technology, Bluetooth and ZigBee technology, and so on . IrDA is a short distance for the half-duplex point-to- point communication. Besides, it’s inconvenient and of high error rate, which make IrDA not applicable to the family network communication. Bluetooth technology is limited by network capacity and it costs much. So Bluetooth technology is not suitable for the home network with a large number of nodes. ZigBee technology has the moderate transmission range and larger network capacity. Here ZigBee technology is developed in the monitoring system
This document describes how to build a DIY parking sensor using an ultrasonic sensor, LED, and buzzer to detect minimum distances and warn drivers. The parking sensor is designed to measure distances with its ultrasonic sensor and light the LED and ring the buzzer when an object gets within 200cm to alert the user of a potential collision. It can be used to help prevent collisions while parking or in tight spaces.
Wi-VI is a technology developed by researchers at MIT that uses Wi-Fi signals to track moving objects behind walls. It uses two transmitting antennas that emit inverse signals and a single receiver. Reflections from static objects cancel out, while reflections from moving objects like people are detected. As a person moves, changes in the reflected signal's time of arrival allow their location to be calculated. Potential applications include incorporating it into smartphones for through-wall motion sensing and monitoring situations in places like hospitals. It provides a basic perspective on movement with relatively low resolution compared to cameras but can still trace simple gestures.
ZigBee is a wireless technology designed for low-power, short-range communication in personal area networks. It operates on various frequency bands globally. The document discusses ZigBee technology, including its architecture, protocol stack, topologies, algorithms, applications, and future scope. ZigBee aims to provide a low-cost, low-power wireless solution for monitoring and control applications.
Wi-Vi is a technology that modifies Wi-Fi signals to allow wireless vision through walls. It works by transmitting two low-power Wi-Fi signals from different antennas, one an inverse of the other, and detecting the interference patterns of the reflected signals. This allows it to detect moving objects behind walls by filtering out static reflections. While it can identify simple gestures and movements, Wi-Vi has low resolution and limitations detecting objects behind thick concrete walls. However, it has advantages of using existing Wi-Fi bandwidth and not requiring devices on the other side of walls.
ZigBee is a wireless networking standard used for control and sensor applications that requires low data rates, low power consumption, and secure networking. It is based on the IEEE 802.15.4 standard and allows for up to 65,000 nodes to connect in a mesh network topology. ZigBee operates in the 2.4GHz, 868MHz, and 915MHz frequency bands and is designed for use in personal area networks for applications like home automation, lighting control, and wireless sensor networks. Research is ongoing to expand ZigBee's uses in fields like wireless communications and neuroengineering.
This document provides an overview of wireless USB (WUSB) including:
- WUSB allows USB devices to connect without cables and offers speeds up to 480 Mbps and a range of up to 300 meters.
- It aims to address limitations of existing wireless technologies like WiFi's high costs and Bluetooth's short range and lower speeds.
- Early WUSB implementations included a Belkin dongle and upcoming Seagate wireless hard drive, and future applications are expected to include wireless phones, keyboards, storage, and more supporting speeds over 1 Gbps.
- Wireless USB aims to standardize wireless connectivity for USB devices to provide the same functionality as wired USB without cables.
GSM - (CHARACTERISITCS, FEATURES & ADVANTAGES AND DISADVANTAGES)kalpanait16
This document discusses the characteristics, features, advantages, and disadvantages of GSM. The key characteristics of GSM include it being a fully digital system, providing security against fraud and enhanced privacy, full international roaming capability, support for new services, and support of short message service. The advantages are better quality of speech, support for data transmission and new digital services, international roaming ability, and a large market. However, some disadvantages include dropped and missed calls, less efficiency in dense areas, and potential security issues.
An indoor positioning system (IPS) uses wireless technologies like Wi-Fi to locate objects or people inside buildings, as GPS does not work well indoors. IPS relies on nearby nodes with known positions rather than satellites. Wi-Fi fingerprinting involves collecting and storing Wi-Fi signal strengths to develop location fingerprints. IPS has many potential uses including indoor navigation, location-based services, security, and analytics. Researchers are working to increase IPS accuracy by supplementing Wi-Fi with other sensor data.
This document describes how to build a DIY parking sensor using an ultrasonic sensor, LED, and buzzer to detect minimum distances and warn drivers. The parking sensor is designed to measure distances with its ultrasonic sensor and light the LED and ring the buzzer when an object gets within 200cm to alert the user of a potential collision. It can be used to help prevent collisions while parking or in tight spaces.
Wi-VI is a technology developed by researchers at MIT that uses Wi-Fi signals to track moving objects behind walls. It uses two transmitting antennas that emit inverse signals and a single receiver. Reflections from static objects cancel out, while reflections from moving objects like people are detected. As a person moves, changes in the reflected signal's time of arrival allow their location to be calculated. Potential applications include incorporating it into smartphones for through-wall motion sensing and monitoring situations in places like hospitals. It provides a basic perspective on movement with relatively low resolution compared to cameras but can still trace simple gestures.
ZigBee is a wireless technology designed for low-power, short-range communication in personal area networks. It operates on various frequency bands globally. The document discusses ZigBee technology, including its architecture, protocol stack, topologies, algorithms, applications, and future scope. ZigBee aims to provide a low-cost, low-power wireless solution for monitoring and control applications.
Wi-Vi is a technology that modifies Wi-Fi signals to allow wireless vision through walls. It works by transmitting two low-power Wi-Fi signals from different antennas, one an inverse of the other, and detecting the interference patterns of the reflected signals. This allows it to detect moving objects behind walls by filtering out static reflections. While it can identify simple gestures and movements, Wi-Vi has low resolution and limitations detecting objects behind thick concrete walls. However, it has advantages of using existing Wi-Fi bandwidth and not requiring devices on the other side of walls.
ZigBee is a wireless networking standard used for control and sensor applications that requires low data rates, low power consumption, and secure networking. It is based on the IEEE 802.15.4 standard and allows for up to 65,000 nodes to connect in a mesh network topology. ZigBee operates in the 2.4GHz, 868MHz, and 915MHz frequency bands and is designed for use in personal area networks for applications like home automation, lighting control, and wireless sensor networks. Research is ongoing to expand ZigBee's uses in fields like wireless communications and neuroengineering.
This document provides an overview of wireless USB (WUSB) including:
- WUSB allows USB devices to connect without cables and offers speeds up to 480 Mbps and a range of up to 300 meters.
- It aims to address limitations of existing wireless technologies like WiFi's high costs and Bluetooth's short range and lower speeds.
- Early WUSB implementations included a Belkin dongle and upcoming Seagate wireless hard drive, and future applications are expected to include wireless phones, keyboards, storage, and more supporting speeds over 1 Gbps.
- Wireless USB aims to standardize wireless connectivity for USB devices to provide the same functionality as wired USB without cables.
GSM - (CHARACTERISITCS, FEATURES & ADVANTAGES AND DISADVANTAGES)kalpanait16
This document discusses the characteristics, features, advantages, and disadvantages of GSM. The key characteristics of GSM include it being a fully digital system, providing security against fraud and enhanced privacy, full international roaming capability, support for new services, and support of short message service. The advantages are better quality of speech, support for data transmission and new digital services, international roaming ability, and a large market. However, some disadvantages include dropped and missed calls, less efficiency in dense areas, and potential security issues.
An indoor positioning system (IPS) uses wireless technologies like Wi-Fi to locate objects or people inside buildings, as GPS does not work well indoors. IPS relies on nearby nodes with known positions rather than satellites. Wi-Fi fingerprinting involves collecting and storing Wi-Fi signal strengths to develop location fingerprints. IPS has many potential uses including indoor navigation, location-based services, security, and analytics. Researchers are working to increase IPS accuracy by supplementing Wi-Fi with other sensor data.
ZigBee is a wireless technology standard created for low-power wireless networks. It uses small, low-power digital radios to transmit data over short distances. ZigBee networks are commonly used in wireless control and monitoring applications that require long battery life, such as home automation and industrial control systems. ZigBee operates on open global standards and has low manufacturing costs, making it suitable for a wide range of wireless control and monitoring applications.
This document provides an overview of a project to create a home automation system using GSM technology. The system would allow users to control home appliances via SMS from their mobile phone. It discusses the motivation, objectives, basic working, components, costs, timeline, and pros and cons of the system. The objectives are to enable remote control of appliances without being physically present and reduce power and time wastage. The estimated cost is 3,814 Rs. and the timeline outlines tasks from feasibility to testing over 6 months.
Bluetooth is a low-cost, short-range wireless technology with
small footprint, small power consumption, reasonable
throughput and hence suitable for various small, batterydriven devices like mobile phones, PDAs, cameras, laptops
etc. Development of the Bluetooth started several years ago
with the intention to replace all sorts of cables used to
connect different devices. In meantime the idea has evolved
and Bluetooth is now developing not just as a point-to-point,
but as a network technology as well.
Bluetooth has gone through periods of big hype when it was
considered as the best short-range technology as well as
through periods when it was considered a failure. However,
the last year could be seen as the turning point year for
Bluetooth. A lot of various Bluetooth devices and accessories
appeared on the market, broad range of users is able to use it
and first experiences are generally positive. The main
challenge in front of Bluetooth developers now is to prove
interoperability between different manufacturers’ devices and
to provide numerous interesting applications. An example of
such applications are wireless sensor networks.
Bluetooth operates in the 2.4GHz frequency band and uses
frequency hopping spread spectrum technique. There are 79
channels, each 1MHz wide, available for hopping.
A Bluetooth device has to be member of a piconet to be able
to communicate with other devices. A piconet is a collection
of up to 8 devices that frequency hop together. Each piconet
has one master, usually the device that initiated establishment
of the piconet, and up to 7 slave devices. Master’s Bluetooth
address is used for definition of the frequency hopping
sequence. Slave devices use the master’s clock to
synchronize their clocks to be able to hop simultaneously.
Wireless sensor networks are an interesting research area
with many possible applications. They are based on
collaborative effort of many small devices capable of
communicating and processing data. There are still many
open issues ranging from the choice of physical and MAC
layer to design of routing and application level protocols.
Bluetooth is a possible choice for data communication in
sensor networks. Good throughput, low-power, low-cost,
standardized specification and hardware availability are
Bluetooth advantages, while slow connection establishment
and lack of scatternet support are some of the deficiencies.
An initial implementation of a Bluetooth based sensor
network platform is presented. Implemented functionality and
various problems experienced during the implementation are
described. Implemented platform presents a good
environment for further research and development of sensor
network protocols and algorithms.
A brief Introduction on Video surveillance TechnologyAneesh Suresh
Video surveillance technology and city-wide surveillance systems in Mumbai could provide several benefits. Such a system could monitor activity across the city in real-time for security purposes like detecting suspicious vehicles or criminal behavior. It would require hundreds of cameras, networking infrastructure, and analytics software. A surveillance system would help authorities with law enforcement, disaster response, and infrastructure monitoring while providing increased safety and traffic information for citizens. However, continuous video monitoring raises privacy issues that would need to be addressed.
Safety is the most important requirement of home for people. With the development of IT technology, network and automatic control technology, a remote home security monitoring and alarming system becomes more and more practicable today. By combining wireless sensor network(WSN) and GSM technology, this paper designs a low-power consumption remote home security monitoring and alarming system that can detect the theft, leaking of raw gas and fire, and send alarm message to the house owner’s mobile phone .Wireless sensor network is composed of a large amount of miniature self-organizing wireless sensor nodes. By combining three kinds of technology such as sensor, micro mechatronics and wireless communication, WSN can detect, collect and deal with the object information in its covering area, and send data to the observer. In a word, WSN technology has the advantages of wide covering area, able to remote monitoring, high monitoring precision, fast network establishment and reasonable cost . GSM network has the advantages of mature technology, wide covering area, long communication distance, and sound communication effect and so on. The remote home security system presented in this paper combines so many advantages of WSN and GSM. Firstly, wherever the users are, once some dangerous instance happens in home, such as gas leaking or thief intruding, this system can send alarm short message to the users through GSM network immediately, informing people the possible dangerous circumstances in home. Secondly, the wireless sensor network established in home has the features of ease establishment, without use of cable, and low-power consumption. Intelligent home, also known as the smart residential home, is moving towards the wireless remote control, multi-media control, and high-speed data transmission. The key technology of intelligent home is compatible to household controllers and it can also meet the transmission requirements through home networking . At present, lots of integrated transport network is based on comprehensive wiring technology , limiting the system to special places, and higher cost. Currently, researches on the wireless intelligent home security surveillance system is becoming a hotspot due to its flexibility and convenience. At present, the application of intelligent home wireless communication technologies mainly include: IrDA infrared technology, Bluetooth and ZigBee technology, and so on . IrDA is a short distance for the half-duplex point-to- point communication. Besides, it’s inconvenient and of high error rate, which make IrDA not applicable to the family network communication. Bluetooth technology is limited by network capacity and it costs much. So Bluetooth technology is not suitable for the home network with a large number of nodes. ZigBee technology has the moderate transmission range and larger network capacity. Here ZigBee technology is developed in the monitoring system
WiGig or IEEE 802.11ad, uses 60GHz spectrum to reach theoretical speeds as high as 7Gbps (bits per second), over a shorter range than today's Wi-Fi technologies. That's a lot more speed: The fastest Wi-Fi system, 802.11ac, tops out at just over 1Gbps.
Presentation Smart Home With Home AutomationArifur Rahman
This document provides an overview of a presentation on smart home automation. It discusses how home automation can automate lighting, HVAC, appliances and other systems for improved convenience, comfort, energy efficiency and security. It describes how smart homes can be remotely controlled and monitored, including security, entertainment and information functions. It outlines the various wired and wireless devices used in home automation and popular software options like Linux, Mister House and Heyu. The presentation also includes diagrams of sample home automation architectures and a remote web interface.
The document presents information on ZigBee, a wireless networking standard. ZigBee is designed for low-cost, low-power wireless mesh networks for applications like wireless light switches, sensors, and industrial equipment. It operates on frequencies of 2.4GHz, 915MHz, and 868MHz and can transmit data at rates up to 250kbps. ZigBee networks consist of coordinator devices, router devices, and low-cost end devices and use 128-bit encryption for security. The standard supports mesh networking and is useful for applications requiring low data rates and long battery life.
Wireless phone standards have a life of their own. You can tell, because they are spoken of reverently in terms of generations. There's Great-Granddad, whose pioneering story pre-dates cellular; Grandma and Grandpa 1G, or analog cellular, Mom and Dad 2G, or digital cellular; 3G wireless, 4G, 5G and so on. This is a survey report PPT on these technology.
ZigBee is a wireless networking standard focused on low-cost, low-power consumption devices for monitoring and control applications. It uses the IEEE 802.15.4 standard for the physical and MAC layers and provides data rates from 20-250kbps depending on frequency band. ZigBee networks can support hundreds of devices with flexible star, peer-to-peer, or cluster tree topologies and address devices using short or IEEE addresses. The technology is well-suited for wireless control in industrial, commercial, and home automation applications where low data rates and power usage are priorities.
Home Security System using Arduino & GSM Aditya Nag
The need for home security alarm systems nowadays is a serious demand. As
the number of crimes is increasing every day, there has to be something that
will keep us safe. We are all aware of the high end security systems present in
the market but they are not easily available to everyone. We therefore intend to
provide a solution by constructing a cost efficient electronic system that has the
capability of sensing the motion of the intruders, also detecting LPG gas
leakage (cooking gas) and setting on the alarm. The basic idea behind this
project is that all the bodies generate some heat energy in the form of infrared
which is invisible to human eyes. But, it can be detected by the electronic motion
sensor. The project involves the use of Arduino, a motion sensor, a gas
sensor,buzzer, LCD display and a simple program. The sensor detects any
motion in its permissible range and triggers the alarm by calling the owner and
sending him a message. It will also send the signal to Arduino which processes
the signal and set off the alarm along with a detection message on display. With
this system, we can easily set up a security alarm in our home for unwanted
intruders and gas leakage.
Zigbee is a specification for a suite of high-level communication protocols used to create personal area networks from small, low-power digital radios. It operates on the IEEE 802.15.4 standard and provides data rates of 250 kbps, 40 kbps, and 20 kbps in different frequency bands. Zigbee devices can transmit data over long distances by passing through a mesh network and has a range of 10-100 meters. The technology targets applications requiring low data transfer rates and long battery life and is often used in industrial automation and home automation through devices like door locks and security sensors.
This document discusses home automation through an Android mobile device. It describes a system where a Bluetooth module and relays are used to allow an Android phone to remotely control home appliances. The phone acts as the host controller, communicating with client modules attached to devices via Bluetooth. The system allows users to control lights, temperature and other electronics from their mobile device.
This document provides an overview of CCTV (closed-circuit television) systems. It discusses what CCTV is, different CCTV camera types, digital CCTV technology, network configurations, transmission methods, technological developments like facial recognition, and applications of CCTV including toll gates, apartments, factories, airports and more. The document aims to outline CCTV systems of today and developments that may be seen in future CCTV technology.
WIMAX stands for Worldwide Interoperability for Microwave Access.WiMAX refers to broadband wireless networks that are based on the IEEE 802.16 standard, which ensures compatibility and interoperability between broadband wireless access equipment.
I have completed Smart Home Automation project in which we are combining the concept of smart home and automated home
with the help of IoT.In this project we have used Microcontroller to control our automation components.We have also used Adafruit.io cloud service IoT platform and IFTTT triggers
The document describes the FTN (Future Telecoms Network) architecture used for Network Rail. The FTN provides voice and data services over GSM-R and uses SDH and HDSL transmission. It consists of core, controlling and access nodes to connect equipment like signal boxes, power supplies and re-locatable buildings. The network is managed by TEC centers and uses RQ2 and OSI protocols for management of equipment.
Wi-Vi or wireless vision is one of the most modern technologies which use wireless fidelity or Wi-Fi as the core principle. Basically, it deals with tracking and manipulation of Wi-Fi signals.
Wi-Vi is used to image the obstacles or solids behind any wall or obstructions. The most important advantage of this is it is completely wireless and no cables or wires are used. Hence it becomes more suitable for usage in mobile devices and other lightweight technologies. Wireless facility also allows it to use in armed force and other security agencies.
As we know that SOANR and RADAR uses the principle of transmission and reflected waves, the Wi-Vi which uses the same principle can be called as an adaptation of those. But it also posses several differences and simpler apparatus. We will see those modifications on the coming pages of the paper.
This document provides an overview of CCTV (closed-circuit television) systems, including:
- CCTV architecture which involves cameras transmitting signals to monitors through either wired or wireless connections.
- Digital CCTV uses video compression and network transmission over Ethernet, allowing for remote access and storage.
- IP cameras transmit video over internet protocols, increasing flexibility but requiring a private network for security.
- CCTV is used widely in industrial facilities, public spaces, businesses and homes for surveillance purposes. Applications discussed include toll gates, apartments, factories, airports and military installations.
This document describes a wireless power theft monitoring system and indication at a local substation. It includes chapters on hardware components like the energy meter, sensors, microcontroller, RF transmitter and receiver. It also covers the software used, including Kiel μVision and C programming. The working of the system is explained, with the consumer side transmitting data to the substation side via RF. Results and future work are discussed. The aim is to design a system to detect electricity theft and backtrack the location using radio frequency technology.
The document discusses the use of Wireless Integrated Network Sensors (WINS) for border security. WINS combine sensing, signal processing, decision making, and wireless networking capabilities. They can be distributed across a border area to continuously monitor for intruders. When sensors detect footsteps or other signals, the data is analyzed and compared to reference values. If an intruder is identified, a signal is sent to the main node. WINS require very low power and can operate on microwatts of power, making them cheaper than other security systems. They are being explored for various monitoring applications due to their low cost and power requirements.
ZigBee is a wireless technology standard created for low-power wireless networks. It uses small, low-power digital radios to transmit data over short distances. ZigBee networks are commonly used in wireless control and monitoring applications that require long battery life, such as home automation and industrial control systems. ZigBee operates on open global standards and has low manufacturing costs, making it suitable for a wide range of wireless control and monitoring applications.
This document provides an overview of a project to create a home automation system using GSM technology. The system would allow users to control home appliances via SMS from their mobile phone. It discusses the motivation, objectives, basic working, components, costs, timeline, and pros and cons of the system. The objectives are to enable remote control of appliances without being physically present and reduce power and time wastage. The estimated cost is 3,814 Rs. and the timeline outlines tasks from feasibility to testing over 6 months.
Bluetooth is a low-cost, short-range wireless technology with
small footprint, small power consumption, reasonable
throughput and hence suitable for various small, batterydriven devices like mobile phones, PDAs, cameras, laptops
etc. Development of the Bluetooth started several years ago
with the intention to replace all sorts of cables used to
connect different devices. In meantime the idea has evolved
and Bluetooth is now developing not just as a point-to-point,
but as a network technology as well.
Bluetooth has gone through periods of big hype when it was
considered as the best short-range technology as well as
through periods when it was considered a failure. However,
the last year could be seen as the turning point year for
Bluetooth. A lot of various Bluetooth devices and accessories
appeared on the market, broad range of users is able to use it
and first experiences are generally positive. The main
challenge in front of Bluetooth developers now is to prove
interoperability between different manufacturers’ devices and
to provide numerous interesting applications. An example of
such applications are wireless sensor networks.
Bluetooth operates in the 2.4GHz frequency band and uses
frequency hopping spread spectrum technique. There are 79
channels, each 1MHz wide, available for hopping.
A Bluetooth device has to be member of a piconet to be able
to communicate with other devices. A piconet is a collection
of up to 8 devices that frequency hop together. Each piconet
has one master, usually the device that initiated establishment
of the piconet, and up to 7 slave devices. Master’s Bluetooth
address is used for definition of the frequency hopping
sequence. Slave devices use the master’s clock to
synchronize their clocks to be able to hop simultaneously.
Wireless sensor networks are an interesting research area
with many possible applications. They are based on
collaborative effort of many small devices capable of
communicating and processing data. There are still many
open issues ranging from the choice of physical and MAC
layer to design of routing and application level protocols.
Bluetooth is a possible choice for data communication in
sensor networks. Good throughput, low-power, low-cost,
standardized specification and hardware availability are
Bluetooth advantages, while slow connection establishment
and lack of scatternet support are some of the deficiencies.
An initial implementation of a Bluetooth based sensor
network platform is presented. Implemented functionality and
various problems experienced during the implementation are
described. Implemented platform presents a good
environment for further research and development of sensor
network protocols and algorithms.
A brief Introduction on Video surveillance TechnologyAneesh Suresh
Video surveillance technology and city-wide surveillance systems in Mumbai could provide several benefits. Such a system could monitor activity across the city in real-time for security purposes like detecting suspicious vehicles or criminal behavior. It would require hundreds of cameras, networking infrastructure, and analytics software. A surveillance system would help authorities with law enforcement, disaster response, and infrastructure monitoring while providing increased safety and traffic information for citizens. However, continuous video monitoring raises privacy issues that would need to be addressed.
Safety is the most important requirement of home for people. With the development of IT technology, network and automatic control technology, a remote home security monitoring and alarming system becomes more and more practicable today. By combining wireless sensor network(WSN) and GSM technology, this paper designs a low-power consumption remote home security monitoring and alarming system that can detect the theft, leaking of raw gas and fire, and send alarm message to the house owner’s mobile phone .Wireless sensor network is composed of a large amount of miniature self-organizing wireless sensor nodes. By combining three kinds of technology such as sensor, micro mechatronics and wireless communication, WSN can detect, collect and deal with the object information in its covering area, and send data to the observer. In a word, WSN technology has the advantages of wide covering area, able to remote monitoring, high monitoring precision, fast network establishment and reasonable cost . GSM network has the advantages of mature technology, wide covering area, long communication distance, and sound communication effect and so on. The remote home security system presented in this paper combines so many advantages of WSN and GSM. Firstly, wherever the users are, once some dangerous instance happens in home, such as gas leaking or thief intruding, this system can send alarm short message to the users through GSM network immediately, informing people the possible dangerous circumstances in home. Secondly, the wireless sensor network established in home has the features of ease establishment, without use of cable, and low-power consumption. Intelligent home, also known as the smart residential home, is moving towards the wireless remote control, multi-media control, and high-speed data transmission. The key technology of intelligent home is compatible to household controllers and it can also meet the transmission requirements through home networking . At present, lots of integrated transport network is based on comprehensive wiring technology , limiting the system to special places, and higher cost. Currently, researches on the wireless intelligent home security surveillance system is becoming a hotspot due to its flexibility and convenience. At present, the application of intelligent home wireless communication technologies mainly include: IrDA infrared technology, Bluetooth and ZigBee technology, and so on . IrDA is a short distance for the half-duplex point-to- point communication. Besides, it’s inconvenient and of high error rate, which make IrDA not applicable to the family network communication. Bluetooth technology is limited by network capacity and it costs much. So Bluetooth technology is not suitable for the home network with a large number of nodes. ZigBee technology has the moderate transmission range and larger network capacity. Here ZigBee technology is developed in the monitoring system
WiGig or IEEE 802.11ad, uses 60GHz spectrum to reach theoretical speeds as high as 7Gbps (bits per second), over a shorter range than today's Wi-Fi technologies. That's a lot more speed: The fastest Wi-Fi system, 802.11ac, tops out at just over 1Gbps.
Presentation Smart Home With Home AutomationArifur Rahman
This document provides an overview of a presentation on smart home automation. It discusses how home automation can automate lighting, HVAC, appliances and other systems for improved convenience, comfort, energy efficiency and security. It describes how smart homes can be remotely controlled and monitored, including security, entertainment and information functions. It outlines the various wired and wireless devices used in home automation and popular software options like Linux, Mister House and Heyu. The presentation also includes diagrams of sample home automation architectures and a remote web interface.
The document presents information on ZigBee, a wireless networking standard. ZigBee is designed for low-cost, low-power wireless mesh networks for applications like wireless light switches, sensors, and industrial equipment. It operates on frequencies of 2.4GHz, 915MHz, and 868MHz and can transmit data at rates up to 250kbps. ZigBee networks consist of coordinator devices, router devices, and low-cost end devices and use 128-bit encryption for security. The standard supports mesh networking and is useful for applications requiring low data rates and long battery life.
Wireless phone standards have a life of their own. You can tell, because they are spoken of reverently in terms of generations. There's Great-Granddad, whose pioneering story pre-dates cellular; Grandma and Grandpa 1G, or analog cellular, Mom and Dad 2G, or digital cellular; 3G wireless, 4G, 5G and so on. This is a survey report PPT on these technology.
ZigBee is a wireless networking standard focused on low-cost, low-power consumption devices for monitoring and control applications. It uses the IEEE 802.15.4 standard for the physical and MAC layers and provides data rates from 20-250kbps depending on frequency band. ZigBee networks can support hundreds of devices with flexible star, peer-to-peer, or cluster tree topologies and address devices using short or IEEE addresses. The technology is well-suited for wireless control in industrial, commercial, and home automation applications where low data rates and power usage are priorities.
Home Security System using Arduino & GSM Aditya Nag
The need for home security alarm systems nowadays is a serious demand. As
the number of crimes is increasing every day, there has to be something that
will keep us safe. We are all aware of the high end security systems present in
the market but they are not easily available to everyone. We therefore intend to
provide a solution by constructing a cost efficient electronic system that has the
capability of sensing the motion of the intruders, also detecting LPG gas
leakage (cooking gas) and setting on the alarm. The basic idea behind this
project is that all the bodies generate some heat energy in the form of infrared
which is invisible to human eyes. But, it can be detected by the electronic motion
sensor. The project involves the use of Arduino, a motion sensor, a gas
sensor,buzzer, LCD display and a simple program. The sensor detects any
motion in its permissible range and triggers the alarm by calling the owner and
sending him a message. It will also send the signal to Arduino which processes
the signal and set off the alarm along with a detection message on display. With
this system, we can easily set up a security alarm in our home for unwanted
intruders and gas leakage.
Zigbee is a specification for a suite of high-level communication protocols used to create personal area networks from small, low-power digital radios. It operates on the IEEE 802.15.4 standard and provides data rates of 250 kbps, 40 kbps, and 20 kbps in different frequency bands. Zigbee devices can transmit data over long distances by passing through a mesh network and has a range of 10-100 meters. The technology targets applications requiring low data transfer rates and long battery life and is often used in industrial automation and home automation through devices like door locks and security sensors.
This document discusses home automation through an Android mobile device. It describes a system where a Bluetooth module and relays are used to allow an Android phone to remotely control home appliances. The phone acts as the host controller, communicating with client modules attached to devices via Bluetooth. The system allows users to control lights, temperature and other electronics from their mobile device.
This document provides an overview of CCTV (closed-circuit television) systems. It discusses what CCTV is, different CCTV camera types, digital CCTV technology, network configurations, transmission methods, technological developments like facial recognition, and applications of CCTV including toll gates, apartments, factories, airports and more. The document aims to outline CCTV systems of today and developments that may be seen in future CCTV technology.
WIMAX stands for Worldwide Interoperability for Microwave Access.WiMAX refers to broadband wireless networks that are based on the IEEE 802.16 standard, which ensures compatibility and interoperability between broadband wireless access equipment.
I have completed Smart Home Automation project in which we are combining the concept of smart home and automated home
with the help of IoT.In this project we have used Microcontroller to control our automation components.We have also used Adafruit.io cloud service IoT platform and IFTTT triggers
The document describes the FTN (Future Telecoms Network) architecture used for Network Rail. The FTN provides voice and data services over GSM-R and uses SDH and HDSL transmission. It consists of core, controlling and access nodes to connect equipment like signal boxes, power supplies and re-locatable buildings. The network is managed by TEC centers and uses RQ2 and OSI protocols for management of equipment.
Wi-Vi or wireless vision is one of the most modern technologies which use wireless fidelity or Wi-Fi as the core principle. Basically, it deals with tracking and manipulation of Wi-Fi signals.
Wi-Vi is used to image the obstacles or solids behind any wall or obstructions. The most important advantage of this is it is completely wireless and no cables or wires are used. Hence it becomes more suitable for usage in mobile devices and other lightweight technologies. Wireless facility also allows it to use in armed force and other security agencies.
As we know that SOANR and RADAR uses the principle of transmission and reflected waves, the Wi-Vi which uses the same principle can be called as an adaptation of those. But it also posses several differences and simpler apparatus. We will see those modifications on the coming pages of the paper.
This document provides an overview of CCTV (closed-circuit television) systems, including:
- CCTV architecture which involves cameras transmitting signals to monitors through either wired or wireless connections.
- Digital CCTV uses video compression and network transmission over Ethernet, allowing for remote access and storage.
- IP cameras transmit video over internet protocols, increasing flexibility but requiring a private network for security.
- CCTV is used widely in industrial facilities, public spaces, businesses and homes for surveillance purposes. Applications discussed include toll gates, apartments, factories, airports and military installations.
This document describes a wireless power theft monitoring system and indication at a local substation. It includes chapters on hardware components like the energy meter, sensors, microcontroller, RF transmitter and receiver. It also covers the software used, including Kiel μVision and C programming. The working of the system is explained, with the consumer side transmitting data to the substation side via RF. Results and future work are discussed. The aim is to design a system to detect electricity theft and backtrack the location using radio frequency technology.
The document discusses the use of Wireless Integrated Network Sensors (WINS) for border security. WINS combine sensing, signal processing, decision making, and wireless networking capabilities. They can be distributed across a border area to continuously monitor for intruders. When sensors detect footsteps or other signals, the data is analyzed and compared to reference values. If an intruder is identified, a signal is sent to the main node. WINS require very low power and can operate on microwatts of power, making them cheaper than other security systems. They are being explored for various monitoring applications due to their low cost and power requirements.
The document discusses a student project on underground cable fault detection. The project aims to analyze different types of underground cables (red, yellow, blue) using a timer, counter and op-amps to detect faults and estimate cable life. Preliminary results show differences in the frequency responses of the cables, which could help identify faults in a low-cost way. The project setup uses a step-down transformer, rectifier, timer/counter chips and LEDs connected to plastic pipes representing the cables.
This document describes a proposed system for wirelessly monitoring power theft. A microcontroller would be interfaced with a meter and sensors to detect abnormal power usage. If power theft is detected, it would trigger a relay to cut power and send a wireless message to alert authorities. The goal is to reduce losses from power theft by identifying exact locations of theft in real-time.
This document proposes a microcontroller-based wireless power theft monitoring system. The system uses wireless sensor nodes connected to consumers, transformers, and transmission lines to monitor power usage. If differences are detected between measured and reported usage, it could indicate power theft. The system aims to reduce energy wastage and theft by detecting where illegal usage occurs and notifying authorities. Some limitations are an inability to identify exact theft locations or individuals, and potential challenges implementing on a large scale.
1) The document reports on a four-week summer training completed by Jaideep Singh on VLSI analog and digital implementation under the guidance of faculty members at Lovely Professional University.
2) During the training, Jaideep learned about analog and digital circuit design using tools like Virtuoso, Assura, Ncsim, Encounter, and Vivado. He designed circuits like an inverter and implemented a Vedic multiplier.
3) The Vedic multiplier uses an ancient Indian mathematical formula called the Urdhva Tiryagbhyam sutra to perform multiplication in a simpler way compared to conventional methods. Jaideep tested the design in FPGA and analyzed its advantages of being area
An electromagnetic pulse (EMP) weapon, also known as an E-bomb, could inflict widespread damage by destroying electronics and thrusting areas back technologically by 200 years. An E-bomb works by generating a powerful electromagnetic field that induces high voltage surges on exposed wiring and circuits, overwhelming and destroying semiconductor devices inside computers and electronics. Key technologies that could enable conventional E-bombs are explosively-pumped flux compression generators and virtual cathode oscillators, which are capable of producing massive electromagnetic pulses with peak powers in the terawatt range and focused microwave outputs, respectively. The effects and lethality of E-bombs are difficult to assess due to variability in targets' hardness, but unprotected civilian and military infrastructure
This document provides information about academic projects available for students in electrical engineering (EEE) from 2012-2013. It lists 38 projects related to image processing, speech processing, communication, signal processing, and VLSI design. Students can contact Vision Solutions via phone or email for more details on developing their project ideas or papers. The company is located in Guntur, India.
GreenDroid is an automated tool that diagnoses energy inefficiency in smartphone applications. It executes applications using Java PathFinder to systematically explore their state spaces. GreenDroid monitors sensor and wake lock operations to detect issues like missing deactivation that can cause energy waste. It also tracks how sensory data is used to identify underutilization. GreenDroid generates detailed reports to help developers validate detected problems. It has analyzed 13 popular Android apps, locating real energy issues in just a few minutes per app.
This document provides a summary of Kumar Chandan and Mayank Kumar's summer internship report on RTL design, Verilog, and FPGA programming at Tevatron Technology in Noida, India. It includes an acknowledgements section thanking their mentor and institution for supporting the project. The abstract indicates that the main objective was to study digital circuit behavior and design using Xilinx software. An introduction is provided on topics like VLSI, HDLs, Verilog, modeling styles in Verilog, and system tasks.
The document discusses wireless integrated network sensors (WINS) and their use in border security. WINS are distributed wireless sensor networks that do not require wiring. They were initially developed by DARPA for defense purposes and to securely monitor borders at low cost and high efficiency. A WINS system architecture includes sensor nodes, routers, and gateways. Sensor nodes continuously sense events, detect objects using various microsensors like seismic, acoustic, and PIR sensors, and transmit data to routers and gateways for processing and monitoring.
The document describes a project report submitted by 5 students for their Bachelor of Technology degree in Electronics and Communication Engineering at Mangalayatan University. The report details the design and development of a border security system using a Wireless Integrated Network Sensor (WINS) that incorporates various electronic components like PIR sensors, cameras, guns controlled by stepper motors, relays, transformers, microcontrollers and more for detection and response. The system is intended to provide monitoring and control capabilities to enhance border security.
According to www.techsciresearch.com report “GCC Insulators Market By Rating, By Type, Competition Forecast & Opportunities, 2011 - 2021”, the market for insulators in GCC is forecast to cross US$ 409 million by 2021
GreenDroid is a 45 nm multicore research prototype that targets the Android mobile phone software stack and can execute general-purpose mobile programs with 11 times less energy than today’s most energy-efficient designs, at similar or better levels of performance. It does this through the use of 100 or so automatically generated, highly specialized, energy-reducing cores, called conservation cores or c-cores. GreenDroid will serve as a prototype for mobile application processors in the next five to ten years.
So greendroid is always better than android.
automation of street light using 8085 microprocessorshubham9929
1. This document describes a project to automate street lights using an 8085 microprocessor.
2. It includes programs to design a digital clock displaying hours, minutes and seconds, as well as code to operate a relay to turn street lights on from 8:00am to 5:00pm.
3. The project concludes that the 8085 microprocessor can easily be used to automate street lights based on the time of day.
This document describes a phase sequence checker for a three phase power supply. The circuit uses a logic circuit with NAND and OR gates to detect the proper phase sequence (RYB) by monitoring pulses. If the sequence changes (e.g. to YBR), a missing pulse is detected and used to trigger a microcontroller. The microcontroller drives LEDs in a circle that will run clockwise for proper sequence and change directions if the sequence is incorrect, indicating a problem. The circuit provides protection for three phase motors by detecting phase reversal that could cause the motor to run in the wrong direction.
This document summarizes the summer training report submitted by four students from Amritsar College of Engineering & Technology at the Punjab State Power Corporation Limited Transformer Repair Workshop in Amritsar. The workshop repairs damaged transformers to save costs compared to the private sector. It has two main circles and aims to repair 120 units per month. The report describes the workshop organization and sections for washing, repairing, drying, assembling, testing and storing transformers. It also explains transformer components, types, workings, efficiency tests and applications.
An Optimal Design for Maximum Power Production from a Solar Field installed w...Ambrose Njepu
This document presents an optimal design for maximizing power output from a solar field installed with stationary solar collectors. It begins by introducing the problem of designing the optimal placement of collectors in a 500m by 80m solar field to maximize power output. It then discusses models for calculating solar angles, irradiation levels, shading effects, and the number of collectors and rows that can fit in the field while minimizing spacing and shading. The goal is to develop an optimization model to maximize energy collection from the solar field subject to constraints.
Today large number of new technologies depends on electrical supply system, so complexity of
wires is very high. In this project, as requirement of wireless electrical power system, project
team present an analysis the concept of cable less transmission i.e. Power without the usage of
any kind of the electrical conductor or wires. Transmission or distribution of 50 or 60 Hz
electrical energy from the generation point to the consumers end without any physical wire has
yet to mature as a familiar and viable technology.
Our team chose to project the feasibility of wireless power transmission through
inductive coupling. This consists of using a transmission and receiving coils as the coupling
antennas. Although the coils do not have to be solenoid they must be in the form of closed loops
to both transmit and receive power. To transmit power an alternating current must be passed
through a closed loop coil. The alternating current will create a time varying magnetic field. The
flux generated by the time varying magnetic field will then induce a voltage on a receiving coil
closed loop system. This seemingly simple system outlines the major principle that our research
investigated. The primary benefits to using inductive coupling are the simplicity of the
transmission and receiving antennas, additionally for small power transmission this is a much
safer means of conveyance. To demonstrate the success of our the teams we created a receiving
circuit to maximize the amount of received power and light an LED at a distance up to two feet.
We were able to create both transmission and receiving circuits capable of transmitting the
necessary power to light an LED in a pulsed mode. On average with transmitting one watt of
power the receiving circuit was able to receive 100 micro-watts of power. While the efficiency of
the system is extremely low, approximately 0.01% with some improvements we feel certain the
efficiency could be greatly improved. Furthermore, as the transmission distance is decreased the
efficiency of any system using inductive coupling improves exponentially.
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMijistjournal
This document presents a smart security system using Zigbee wireless technology, GSM, sensors, and a smartphone. The system allows a homeowner to monitor and control their home security from a remote location. When a sensor detects an intrusion, a signal is sent to a microcontroller and then to the homeowner's phone via Zigbee and GSM. The owner can then make a video call to view their home and optionally activate a gas spray or lock the doors for added protection. The system provides remote monitoring and control of a home security system in a low-cost and easy to install package.
As technology becomes more advanced and modernized; more features are added to the existing system
for the purpose of satisfying the increasing security needs of the people. Deploying wireless technologies
for security and control in home offers attractive benefits along with user friendly interface. In this paper
we present a smart security system comprises of Zigbee, GSM, Sensors and Smartphone for Security
monitoring and control, when the user is at remote premises. Three sensors namely P
IR, vibration and door sensor are installed at windows and doors. Whenever there is a security breach the
sensors sends the signal to the Pic microcontroller. The Max 232 converter provides serial interface
between the microcontroller and the zigbee. The Zigbee end device then transmits the signal to the Zigbee
coordinator. The ZC at the control console communicates with MCU using max 232 converters. MCU
would in turn access and control the GSM module via AT commands and automatically sends SMS to the
owner's mobile phone informing him about the security breach. On receiving the SMS, user can make a
video call using Skype account; Smartphone installed at home will feed us with a live video. On viewing
the video the user can know whether an intruder has entered or not. Then accordingly faint gas valve and
door lock can be controlled by the user. Thus whenever there is an intrusion, our system lets the user to
monitor and control his premises from any part of the world.
This document is a project proposal for implementing wireless data communication using Zigbee technology. It discusses using Zigbee modules to encrypt data from a keypad, transmit it wirelessly between two PCs up to 70 meters away, then decrypt and display the data. The objectives are to provide reliable and secure data transmission with low power consumption. Zigbee is suitable because it supports mesh networking, low data rates, long battery life, and security. The proposal reviews related work using Zigbee in wireless sensor networks for agriculture and discusses how Zigbee can benefit applications in hospitals, homes, and industry. The scope is limited to transmitting encrypted data between two PCs using Zigbee modules.
Application of Zigbee in Smart Home with Dynamic Routing AlgorithmNooria Sukmaningtyas
In order to avoid damaging the walls and bore a hole through the walls, also to save the cost of
rewiring, low voltage power line can be used to implement the smart home. However, several difficult
problem must be solved at the same time , the most important are finding a technology method to
suppress the noise interference and resist the weaker signal. The smart home system is introduced in the
paper. During the design of Smart Home System adopting power line signal carrier, a dynamic routine
algorithm based on the idea of Genetic Algorithm is proposed to cope with the time-varying and random
feature of power line channel. Thus the system can find the transmission path in real time and dispatch the
signal carrier to transmit among the nodes. With this algorithm, the communication between a certain
group-controller and its terminal nodes or between the main-controller and the group-controllers is realized
successfully. In the proposed algorithm all nodes but the controller adopt same driver, therefore the plug
and play is realized for all nodes.
Study of ZIGBEE Technology and its Application in Wireless Automation Systemijtsrd
Wireless Automation System has drawn acceptable attentions of researchers or people using it for more than a decade. These systems can be implemented by using technologies as mentioned Z Wave, Insteon, Bluetooth, WiFi, Wavenis and ZigBee. In the above mentioned technologies ZigBee based systems uses have increased gradually in different applications scenarios due to its low cost and low power consumption. ZigBee is formalized by IEEE 802.15.4 radio standards and it is one of the mostly used transceiver standard that is used as a communication technology to connect local networks. In this paper detailed study of ZigBee has been interpreted and its application in automation system has also been discussed. Satyajit Dandi ""Study of ZIGBEE Technology and its Application in Wireless Automation System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30200.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30200/study-of-zigbee-technology-and-its-application-in-wireless-automation-system/satyajit-dandi
The document discusses a smart home system based on 6LowPAN. It first defines IoT and describes how devices will be connected through communications infrastructure to provide services. It then discusses how 6LowPAN allows IPv6 packets to be carried efficiently within small link layer frames, enabling communication between devices. The proposed smart home system architecture uses 6LowPAN to implement a low-power wireless network between sensors and controllers that can remotely monitor and control home appliances and systems.
Smart home control system (SHCS) can be integrated into an existing home appliances to reduce the need for human intervention, increase security and energy efficiency. However, it is still an open problem due to difficulties such as network distance, signal interference, not user friendly, increased cost and power consumption. This paper reviews various topics on smart home technologies including control system, smart home network, smart home appliance and sensor technologies for smart home. In this research, the proposed prototype of home automation allows users to remotely switch on or off any household appliances based on Internet of Things (IoT) with the enhancement of solar charger. This prototype uses four types of sensors i.e. PIR sensor, temperature sensor, ultrasonic sensor and smoke gas sensor for automatic environmental control and intrusion detection. The hardware, software, and test field design will be discussed in this paper.
NRF based wireless light and Fan dimmer controlling system.IRJET Journal
This document discusses the design and implementation of a wireless light and fan dimmer controlling system using Near Field Communication (NRF) technology. It presents the circuit diagrams and working of the NRF transmitter, receiver for controlling a light bulb, and receiver for controlling a fan speed. The transmitter uses a digital rotor for providing input to control the light and fan remotely. The receivers use relays and TRIACs respectively to switch the light and control the fan speed based on signals received from the transmitter. The system allows wireless control of home appliances like lights and fans to enable home automation.
This document provides an overview of 5G wireless technology, including its network architecture, hardware, software, vision, features, challenges and development stages. It compares 1G to 5G technologies and discusses usage patterns. Key concepts discussed include a unified global standard, ubiquitous computing using cognitive radio, and high altitude platform stations. The document outlines the METIS project and stages of 5G development in Europe, South Korea, and by companies such as Samsung, Huawei, and NTT DoCoMo.
This document provides an overview of Zigbee wireless technology. It discusses that Zigbee is an open global standard for wireless personal area networks designed for low data rate, low power consumption applications. It then covers the objectives, literature survey, how Zigbee works including topology, layers and block diagram. The advantages are listed as long battery life, remote management capabilities. Limitations include lack of security and cost of replacement. Applications discussed are home automation, wireless sensor networks, industrial control and medical data collection. The conclusion states there is increasing demand for Zigbee applications and it provides low power specifications for wireless devices.
Wireless Data Communication Techniques to Coordinate Distributed Rooftop PVs ...TELKOMNIKA JOURNAL
A necessity of the availability of communication network to provide data transfer amongst the
coordinated single-phase rooftop photovoltaic (PV) in unbalanced three-phase low voltage (LV) feeder is
essential since fetching data within the sensor of each PV unit requires real-time measurement and
reliable data exchange within smart grid (SG), loads and other PV units. The main objective of this paper is
to model the popular Wi-Fi, WiMax and ZigBee wireless data communication techniques into algorithms
using numerical analysis. Those communication technologies have low cost and low power consumption.
The benefits and drawbacks of those considered wireless data communications are shown as the required
data that transferred and appropriate coding is also proposed. The number of transmitted symbols and the
processing time delay of the proposed data coding are numerically analyzed, the results indicated that the
100% penetration level of PV that resulted higher injected reactive power back into the networks is able to
be overcome since the coordinated PVs along the feeder is communicating to lower the unbalanced
voltage profile.
Project Dissertation - ZigBee Based Wireless Sensor NetworkAnand Agrawal
This document presents a project report on developing a ZigBee based wireless sensor network for smart home security and monitoring applications. The project aims to implement a wireless sensor network using ZigBee technology to allow for monitoring of home security sensors and control of devices from a remote location. The report describes the background of wireless technologies including ZigBee, outlines the motivation and problem statement for the project, provides a literature review of wireless sensor networks and ZigBee protocol, and discusses the implementation and results of building a prototype ZigBee wireless sensor network with sensors for security and home automation.
A ZigBee Based Wireless Sensor Network for an Agricultural Environmentijsrd.com
This paper reports the design and development of a smart wireless sensor network (WSN) for an agricultural environment. Monitoring agricultural environments for various factors such as light, temperature and humidity along with other factors can be of significance. The sensor data is transmitted to network coordinator which is heart of the wireless personal area network. In the modern scenario wireless networks contains sensors as well as actuators. ZigBee is newly developed technology that works on IEEE standard 802.15.4, which can be used in the wireless sensor network (WSN). The low data rates, low power consumption, low cost are main features of ZigBee. WSN is composed of ZigBee coordinator (network coordinator), ZigBee router and ZigBee end device. The sensor nodes information in the network will be sent to the coordinator, the coordinator collects sensor data, stores the data in memory, process the data, and route the data to appropriate node.
The document summarizes a research paper on monitoring environmental parameters like temperature and humidity in a greenhouse using a wireless sensor network combining ZigBee and GSM technologies. It describes a system with three sensor nodes deployed in a greenhouse to measure temperature, humidity and light intensity. One node acts as a coordinator that collects data from all nodes and transmits it via SMS to a cell phone. The system allows continuous monitoring over a large area at low cost to help farmers improve crop quality and productivity.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The document describes a robust and trusted routing scheme (RTS) for IoT-based mobile wireless mesh networks. The RTS aims to improve network reliability and security. It consists of two main techniques: (1) a network infrastructure using multi-hop connectivity between mesh clients, routers and gateways; and (2) secure and trusted data routing between devices using RSA cryptography with public/private keys. The RTS allows for self-configuration, coverage expansion, and recovery from failures while preventing various security attacks.
This document provides an introduction and table of contents for a project on developing a home automation system using a cellular phone interface. The introduction discusses how technologies like wireless LAN, GSM, and internet access have enabled remote home automation. It proposes designing a system that connects home appliances wirelessly and allows them to be controlled via a GSM network from a mobile phone. The statement of problem discusses how people often leave home appliances on by accident when leaving home, and how a mobile phone-based system could provide a solution. The aim and objectives are to establish remote control of home appliances from any location using a mobile phone and relevant technologies. The literature review discusses several existing studies on home automation systems using technologies like Bluetooth, servers, micro
In IoT applications, BLE frequency, 433MHz frequency, Wi-Fi frequency, 2.4GHz frequency, GPS frequency, GPRS frequency, LoRa frequency, NB-IoT frequency, etc. are often mentioned technologies. Among them, 433MHz frequency has a wide range of applications but is not well known. In this article, we will start from a few basic knowledge points to introduce 433MHz frequency.
Wireless radio frequency is a kind of non-contact automatic identification technology that emerged in the 1990s of the 20th century and is a kind of wireless communication technology with close distance, low complexity, low power consumption, low data rate, and low cost.
Zigbee sensor network integrated with 4 g for iot applicationsgoodgood
This document discusses integrating Zigbee wireless sensor networks with 4G technology. It proposes a system where Zigbee sensor nodes in multiple PANs (personal area networks) transmit real-time multimedia data through a processing controller unit connected to a WiMAX base station. This allows data to be transmitted over long distances through the 4G network in a secure manner. The document analyzes the performance of this integrated system by simulating video conferencing, voice, and data applications. The results show low packet delay, jitter, and end-to-end delay, indicating the system can support high-quality multimedia transmission over long distances with minimal delays.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to Report ON a Remote Security System Using wireless sensor and GSM module Technology (20)
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Report ON a Remote Security System Using wireless sensor and GSM module Technology
1. 1
SEMINAR REPORT
ON
A REMOTE SECURITY SYSTEM USING
WIRELESS SENSOR NETWORK AND
GSM MODULE TECHNOLOGY
Submitted by
PRIYANKA TYAGI
in partial fulfillment for the award of the degree
of
Bachelor of Technology
In
ELECTRONICS AND COMMUNICATION
ENGINEERING
URJA MANDIR
Department of Electronics
Banasthali Vidyapith
Rajasthan-304022(India)
2016
2. 2
ACKNOWLEDGEMENT
There are many individuals who helped me a lot to complete my project on the topic
“REMOTE SECURITY SYSTEM USING WIRELESS SENSOR NETWORK AND GSM
TECHNOLOGY”.
I would like to express my sincere thanks to my seminar guide Mr.Pradeep Lamba, Department
of Electronics and communication for his timely guidance, constant support, and sincere co-
operation for the completion of the project. I would also like to thanks Dr. Ritu Vijay, Head
of Electrical and Electronics Department for her constant support and appropriate guidelines
for the project.
I would like to thanks my parents, friends and God for their support and belief on me for the
completion of this project.
Mr.Pradeep Lamba Priyanka Tyagi
(Seminar Guide) (B.Tech 3rd
Year ECE)
3. 3
ABSTRACT
A low-power consumption remote home security alarm system developed by applying WSN
and GSM technology is presented. It can detect the theft, leaking of raw gas and fire, and
send alarm message remotely. The hardware of this system includes the single chip
C5081F310, wireless receiving and sending chip CC1100 as well as the SIMENS TC35 GSM
module. The system software developed in C51 language has the ability of collecting,
wireless receiving and sending data, and can send a piece of alarm short message to the user’s
mobile phone when some dangerous condition has been detected. Security monitoring
systems are popular in home automation, and Zigbee is a new industrial standard wireless
sensor networks. This paper introduces an experimental home security monitoring and
alarming system based on Zigbee technology, it is capable of monitoring door & window
magnetic contact, smoke, gas leak, water flooding, providing simple controls such as turning
off the valves, and sending the alarms to the residential area security network etc. The
security alarming system is based on Zigbee chip MC13192 and low power consumption
micro-controller MSP430F135. A description of the system architecture, circuit principle
and the firmware flowchart is presented. The system uses a control key fob for activating and
de-activating the alarm easily, supports Web interface so that user can access the system
remotely to control, search or review the history record, and offers a LCD panel for simple
configuration.
Keywords-wireless sensor network; global system for mobile communications; home
security system; short message I; Zigbee
4. 4
TABLE OF CONTENTS
1. INTRODUCTION 6
2. SYSTEM ARCHITECTURE 6
3. SELECTION AND DESIGN 8
3.1WIRELESS NETWORK 8
3.2802.11 WIRELESS LAN 9
3.2.1 802.11a 10
3.2.2 802.11b 10
3.2.3 802.11g 11
3.3WSN NODE MODULE 11
3.4CHOSEN OF GSM MODULE 12
4. DESIGN OF SYSTEM SOFT. 13
4.1SOFT. MODULE FOR WSN NODE COMM. 13
4.2SOFT. MODULE GSM COMM. 15
5. SET UP A PROTOTYPE SYSTEM AND TEST 16
6. GSM TECH. GSM MODEM 16
7. WHAT IS GSM? 16
7.1ADVANTAGES OF GSM 17
7.2FEATURES OF GSM 17
8. WSN CHARACTERISTICS 17
8.1WI-FI 18
8.2BLUETOOTH 18
8.3ZIGBEE 18
8.4NETWORK TOPOLOGY 18
8.5COMM. PROTOCOLS AND ROUTING 19
8.6POWER MANAGEMENT 20
8.7NETWORK COVERAGE 20
5. 5
9. STSTEM TESTING AND EXP. DATA 21
10.CURRENT AND FUTURE DEVELOPMENT 21
11.PROPOSED WORK 22
12.CONCLUSION 22
13.REFERENCES 22
6. 6
1. INTRODUCTION
Safety is the most important requirement of home for people. With the development of IT
technology, network and automatic control technology, a remote home security monitoring
and alarming system becomes more and more practicable today. By combining wireless
sensor network(WSN) and GSM technology, this paper designs a low-power consumption
remote home security monitoring and alarming system that can detect the theft, leaking of
raw gas and fire, and send alarm message to the house owner’s mobile phone .Wireless
sensor network is composed of a large amount of miniature self-organizing wireless sensor
nodes. By combining three kinds of technology such as sensor, micro mechatronics and
wireless communication, WSN can detect, collect and deal with the object information in its
covering area, and send data to the observer. In a word, WSN technology has the advantages
of wide covering area, able to remote monitoring, high monitoring precision, fast network
establishment and reasonable cost . GSM network has the advantages of mature technology,
wide covering area, long communication distance, and sound communication effect and so
on. The remote home security system presented in this paper combines so many advantages
of WSN and GSM. Firstly, wherever the users are, once some dangerous instance happens in
home, such as gas leaking or thief intruding, this system can send alarm short message to the
users through GSM network immediately, informing people the possible dangerous
circumstances in home. Secondly, the wireless sensor network established in home has the
features of ease establishment, without use of cable, and low-power consumption. Intelligent
home, also known as the smart residential home, is moving towards the wireless remote
control, multi-media control, and high-speed data transmission. The key technology of
intelligent home is compatible to household controllers and it can also meet the transmission
requirements through home networking . At present, lots of integrated transport network is
based on comprehensive wiring technology , limiting the system to special places, and higher
cost. Currently, researches on the wireless intelligent home security surveillance system is
becoming a hotspot due to its flexibility and convenience. At present, the application of
intelligent home wireless communication technologies mainly include: IrDA infrared
technology, Bluetooth and ZigBee technology, and so on . IrDA is a short distance for the
half-duplex point-to- point communication. Besides, it’s inconvenient and of high error rate,
which make IrDA not applicable to the family network communication. Bluetooth technology
is limited by network capacity and it costs much. So Bluetooth technology is not suitable for
the home network with a large number of nodes. ZigBee technology has the moderate
7. 7
transmission range and larger network capacity. Here ZigBee technology is developed in the
monitoring system.
2. SYSTEM ARCHITECTURE
Modular Design is throughout the system. System is built on the embedded system, and it can
monitor the important position through the CMOS camera. Home state SMS and images
MMS are sent to specialized mobile phones. Besides, household appliances can be remotely
controlled by SMS. ZigBee module connects household appliances, the system motherboard
with smoke, temperature, gas sensors, forming a wireless networking. The system
motherboard core controller is S3C44B0X-32 microcontroller and mainly responsible for
dealing with the data. Through MMS modules and ZigBee module it can send information
and instructions. And Expand access plate to smoke, infrared, gas and other domestic security
state sensor. MMS module makes the system controller send the family security status
information to mobile phone users. Users send and receive text messages of instruction;
ZigBee module is responsible for the system motherboard with the expansion of household
appliances between the board and cross-linking of data. The system structure is illustrated in
Fig.1. It is composed of the MCU-based home wireless control center, one WSN center node
module, and several data collecting nodes, GSM module, GSM network and mobile phone.
The WSN data collecting node modules are connected with pyroelectric infrared detector,
temperature sensor, smoke detector and gas sensor separately. When the pyroelectric infrared
detector finds that some people intrudes into the house abnormally; or when the temperature
sensor detects too high indoor temperature and at the same time, the smoke sensor detects
overproof smoke concentration; or when the gas sensor detects overproof. combustible gas
concentration, the sensors will send encoded alarm signal to the home control center through
the wireless sensor network established in home. Once the wireless control center receives
alarm signal, it will send alarm short message to the users through the GSM module and
GSM network immediately.
3. SELECTION AND DESIGN OF SYSTEM HARDWARE
3.1WIRELESS NETWORK-In 1997, the IEEE ratified the 802.11 Wireless LAN
8. 8
standards, establishing a global standard for implementing and deploying Wireless LANS.
The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet
counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the
throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The
802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio
frequency for high-speed data communications
Figure 3.1: OSI Reference Model of 802.11
As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11
specification affects the lower layers of the OSI reference model, the Physical and Data Link
layers.
The Physical Layer defines how data is transmitted over the physical medium. The IEEE
assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The
two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-
spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific,
and Medical) 2.4 GHz band for unlicensed use. Other devices that operate on this band
9. 9
include remote phones, microwave ovens, and baby monitors.
FHSS and DSSS are different techniques to transmit data over radio waves. FHSS uses a
simple frequency hopping technique to navigate the 2.4GHz band which is divided into 75
sub-channels 1MHz each. The sender and receiver negotiate a sequence pattern over the sub-
channels.
DSSS, however, utilizes the same channel for the duration of the transmission by dividing the
2.4 GHz band into 14 channels at 22MHz each with 11 channels overlapping the adjacent
ones and three non-overlapping channels. To compensate for noise and interference, DSSS
uses a technique called "chipping", where each data bit is converted into redundant patterns
called "chips".
The Data Link layer is made up of two sub-layers, the Media Access Control (MAC) layer
and the Logical Link Control (LLC) layer. The Data Link layer determines how transmitted
data is packaged, addressed and managed within the network. The LLC layer uses the
identical 48-bit addressing found in other 802 LAN networks like Ethernet where the MAC
layer uses a unique mechanism called carrier sense multiple access, collision avoidance
(CSMA/CA). This mechanism is similar to the carrier sense multiple access collision detect
(CSMA/CD) used in Ethernet, with a few major differences. Opposed to Ethernet, which
sends out a signal until a collision is detected before a resend, CSMA/CA senses the airwaves
for activity and sends out a signal when the airwaves are free. If the sender detects conflicting
signals, it will wait for a random period before retrying. This technique is called "listening
before talking" (LBT) and probably would be effective if applied to verbal communications
also.
To minimize the risk of transmission collisions, the 802.11 committee decided a mechanism
called Request-To-Send / Clear-To-Send (RTS/CTS). An example of this would be when an
AP accepts data transmitted from a wireless station; the AP would send a RTS frame to the
wireless station that requests a specific amount of time that the station has to deliver data to
it. The wireless station would then send an CTS frame acknowledging that it will wait to send
any communications until the AP completes sending data. All the other wireless stations will
hear the transmission as well and wait before sending data. Due to the fragile nature of
wireless transmission compared to wired transfers, the acknowledgement model (ACK) is
employed on both ends to ensure that data does not get lost in the airwaves.
3.2 802.11 WIRELESS LAN STANDARD
10. 10
Several extensions to the 802.11 standard have been either ratified or are in progress by their
respective task group committees. Below are three current task group activities that affect
WLAN users most directly.
3.2.1 802.11a
The 802.11a ("another band") extension operates on a different physical layer specification
than the 802.11 standard at 2.4GHz. 802.11a operates at 5GHz and supports date rates up to
54Mbps. The FCC has allocated 300Mz of RF spectrum for unlicensed operation in the 5GHz
range. Although 802.11a supports much higher data rates, the effective distance of
transmission is much shorter than 802.11b and is not compatible with 802.11b equipment and
in its current state is usable only in the US. However, several vendors have embraced the
802.11a standard and some have dual band support AP devices and network cards.
3.2.2 802.11b
The 802.11b ("baseline") is currently the de facto standard for Wireless LANs. As discussed
earlier, the 802.11b extension raised the data rate bar from 2Mbps to 11Mbps, even though
the actual throughput is much less. The original method employed by the 802.11 committee
for chipping data transmissions was the 11-bit chipping encoding technique called the
"Barker Sequence". The increased data rate from 2Mbps to 11Mbps was achieved by utilizing
an advanced encoding technique called Complementary Code Keying (CCK). The CCK uses
Quadrature Phase Shift Keying (QPSK) for modulation to achieve the higher data rates.
3.2.3 802.11g
The 802.11g ("going beyond b") task group, like 802.11a is focusing on raising the data
transmission rate up to 54Mbps, but on the 2.4MHz band. The specification was approved by
the IEEE in 2001 and is expected to be ratified in the second half of 2002. It is an attractive
alternative to the 802.11a extension due to its backward compatibility to 802.11b, which
preserves previous infrastructure investments.
11. 11
3.3WIRELESS SENSOR NETWORK NODE MODULE
The wireless sensor network in home of this system is composed of one center node module
and several data collecting node modules, operating in point-to-multipoint communication
mode. In different application, the formation of a WSN node is not always the same. In
general, a WSN node includes four parts: data collecting unit, data processing unit, wireless
communication unit and power management unit.
The data collecting unit is composed of the sensors and A/D conversion module. In this
remote wireless home security system, some pyroelectric infrared detectors, temperature
sensors, smoke detectors and gas sensors are used .The data processing unit is responsible to
save and deal with the data collected by the sensors and received from other nodes. In this
system, the C8051F310 MCU from Cygnal Corporation is chosen as the data processing unit.
The wireless communication unit is often composed of the low power consumption, short
distance radio frequency (RF) transceiver. In this system, the wireless dual-way chip CC1100
dedicated in wireless and low power consumption application is chosen to implement
wireless communication. C8051F310 MCU can control the main working parameter of
CC1100 and communicate with CC1100 through SPI interface. The SPI standard interface
include main output slave input (MOSI), main input slave output (MISO) and serial clock
(CLK). The master CLK is synchronized with the slave CLK.CC1100 can set the working
mode, read and write cache data and status register through SPI bus. The RF chip is
12. 12
connected with MCU through SPI interface to make a wireless communication system that
can control receiving and sending function freely. The hardware connection between
C8051F310 with CC1100 is showed in Fig. 2. The SPI interface of CC1100 is to be
connected to the hardware SPI interface of CPU. In general, GDO0 or GDO2 pin of CC1100
can be connected to any pin of CPU. But if an interrupt service program is to be used to
implement the function of data receiving and transmitting or wireless wakeup, GDO0 or
GDO2 pin of CC1100 must beconnected to the out interrupt pin of CPU.
3.4 CHOSEN OF GSM MODLUE
As the third generation GSM dual frequency module, TC35 GSM module has the following
features: compact and low power consumption; support dual frequency of GSM900 and
GSM1800; provide standard AT command interface to users; provide fast, reliable and safe
transmission of data, voice, short message and fax . It is ideal for this system because of its
high quality short message function.
4. DESIGN OF SYSTEM SOFTWARE
The system software, which is developed with C51 programming language, has two main
modules, one for the WSN node communication, and one for the GSM communication.
4.1 SOFTWARE MODULE FOR WSN NODE COMMUNICATION
13. 13
In the indoor wireless sensor network, the communication protocol is divided into three
layers. The first layer is physical layer whose function has been implemented by CC1100
hardware itself. The second layer is network layer. The second layer is network layer which
applies TEEN (threshold sensitive energy efficient sensor network) protocol. The data will be
transmitted through the wireless sensor network only when the observed value changes
suddenly. The third layer is application layer. In this layer, the system’s application software
is divided into two modules, WSN data collecting node software module and WSN center
node software module. The former, running on the slave MCU of data collecting nodes, is
responsible for collecting sensor data and wireless transmitting them. The latter, running on
the master MCU of WSN center node, is responsible for wireless receiving data and judging
whether it’s need to start the alarming process or not. If yes, it will drive TC35 GSM module
to send alarm short message to user’s mobile phone.
14. 14
4.2 SOFTWARE MODULE FOR GSM COMMUNICATION
When the WSN center node module receives abnormal data, it will drive TC35 GSM module
to send alarm short message through GSM network. TC35 GSM module supports standard
AT command set. MCU control the operation of TC35 module by inputting different AT
function commands through theserial port . Some GSM AT commands relevant to short
message are listed . The sending mode of short message depends on the interface supported
by the short message service center in the GSM network. European Telecommunications
Standards Institute (ETSI) has defined three kinds of interface protocol for sending short
message: Block mode, Text mode and PDU mode. Block mode requires the mobile phone
manufacture to provide driving support. Text mode doesn‟t support Chinese text . So at
present, PDU mode has become the core of most mobile phone for their short message
15. 15
communication. It can provide more powerful functions than the other modes. So, this system
applies PDU mode to send alarming short message.
5. SET UP A PROTOTYPE SYSTEM AND TEST
we set up a sample prototype system in our lab room. As mentioned above, choose
C8051F310 MCU as the data processing unit of WSN center node module and data collecting
node module. Here, C8051F310 has a temperature sensor imbedded that can detect the in-
room temperature. After hardware connection, install the appropriate software developed
with C51 on MCU-based indoor wireless control center. Then, we can start the test with this
prototype system by changing the preset temperature threshold. When the actual in-room
temperature exceeds this preset temperature threshold, the control center will immediately
trigger TC35 GSM module to send an alarm short message to our mobile phone. Through the
test process, this prototype system operated successfully and effectively with reliable and
well communication.
6. GSM TECHNOLOGY GSM MODEM
A GSM modem is a specialized type of modem which accepts a SIM card, and operates over
a subscription to a mobile operator, just like a mobile phone. From the mobile operator
perspective, a GSM modem looks just like a mobile phone. When a GSM modem is
connected to a computer, this allows the computer to use the GSM modem to communicate
over the mobile network. While these GSM modems are most frequently used to provide
mobile internet connectivity, many of them can also be used for sending and receiving SMS
and MMS messages. A GSM modem can be a dedicated modem device with a serial, USB or
Bluetooth connection, or it can be a mobile phone that provides GSM modem capabilities.
7. WHAT IS GSM ?
GSM stands for Global System for Mobile Communication. It is a digital cellular technology
used for transmitting mobile voice and data services.GSM is the most widely accepted
standard in telecommunications and it is implemented globally.GSM is a circuit-switched
system that divides each 200 kHz channel into eight 25 kHz time-slots. GSM operates on the
mobile communication bands 900 MHz and 1800 MHz in most parts of the world. In the US,
16. 16
GSM operates in the bands 850 MHz and 1900 MHz.GSM makes use of narrowband Time
Division Multiple Access (TDMA) GSM provides basic to advanced voice and data services
including roaming service. Roaming is the ability to use your GSM phone number in another
GSM network.GSM digitizes and compresses data, then sends it down through a channel
with two other streams of user data, each in its own timeslot.
7.1 ADVANTAGES OF GSM
Improved spectrum efficiency
International roaming
Low-cost mobile sets and base stations (BSs)
High-quality speech
Compatibility with Integrated Services Digital Network (ISDN) and other telephone
company services
Support for new services
7.2 FEATURES OF GSM
Short Message Service which allows you to send and receive 126 character text
messages.
Ability to use same phone in a number of network-related countries.
Allows data transmission and reception across GSM networks at speeds up to 9,600
bps currently. Forwarding of calls to another number. More capacity, ensuring rapid
call set-up.
Handsets also smaller and more robust
Place a call on Hold while you access another call.
Encrypted conservations that cannot be tapped.
Emergency Calls - In the majority of countries, the global 112 emergency number can
be dialed free.
No-static connections
8.WIRELESS SENSOR NETWORK CHARACTERISTICS
17. 17
For measuring and monitoring physical and non-physical activities in a remote area, various
types of wireless sensors are generally grouped in a network . Apart from the sensors, the
network may incorporate repeater hubs to extend the transmission range of the retrieved data.
The network may also incorporate processing units to analyze the data. The sensor networks
employ small, low power devices to do all the tasks. The sensors in the network capture the
activity and the collected data is communicated to a remote monitoring centre using wireless
data transfer techniques such as Radio Frequency (RF) communication. The size and cost
constraints on these types of network result in corresponding constraints being exerted on the
resources such a energy, memory, computational speed and bandwidth. a typical wireless
sensor network. It consists of a Data Acquisition Network (DAN) and a Data Distribution
Network (DDN). In the Data Acquisition Network, the data collected by the sensor nodes are
transmitted, using RF channel, to the Base Station Controller (BSC), which in turn is
connected to the Management Centre using wired or wireless connection. Some pre-
processing of data is often done at the base station which, for a small and simple sensor
network, is generally equipped with a microprocessor or microcontroller. The entire network
is monitored and controlled by the Management Centre which is equipped with large storage
capacity and computational resources to undertake data analysis and presentation. The Base
Station provides a gateway to the Data Distribution Network. For distribution of data within
the DDN, various kinds of transmission techniques are used, such as Wi-Fi, Bluetooth and
Cellular networks (CDMA/GSM). Data may be distributed to remote PCs/ Notebooks,
handheld PDAs and cellular phones. Thus, to build and implement a sensor network, a
designer needs to consider several aspects which are discussed in the following sub-sections.
8.1 WI-FI
Wi-Fi networks use radio technologies IEEE 802.11x standard, which is a standard that uses
the 2.4 GHz and 5 GHz bands, to transmit and receive the wireless data . Wi–Fi is useful in
implementing ad-hoc wireless networks.
8.2 BLUETOOTH
Bluetooth is an open standard for short-range, low power, and low-cost digital radio wireless
communication. Bluetooth is now being used in a wide range of personal products and the
18. 18
technology is readily available in the market. The blue tooth transceiver use unlicensed 2.4
GHz frequency band, with a nominal bandwidth of 1 MHz for each channel. It offers an
effective range of 10 meters (32 feet). Bluetooth can indeed be used in wireless sensor
network for short range applications.
8.3 ZIGBEE
Zigbee is a relatively new, wireless personal area network technology based on IEEE
802.15.4, with a transmission range of 100+ meters . ZigBee based communication devices
consume very little power and hence the battery life of 1000+ days is common. ZigBee has
enormous advantages compared to Bluetooth when used in wireless sensor networks. The
reasons include more coverage area, less power consumption, and secure networking. ZigBee
operates in the industrial, scientific and medical radio bands - 868 MHz in Europe, 915 MHz
in the USA and 2.4 GHz in most other countries in the rest of the world.
8.4 NETWORK TOPOLOGY
In any communication network, the message should be transmitted with a prescribed
throughput and reliability. This is usually termed as “Quality of Service” (QoS). It can be
specified in terms of message delay, bit error rates, packet loss, economic cost of
transmission, transmission power, etc. Depending on the QoS, the installation environment,
eco-nomic considerations, and the application, one of several basic network topologies such
as star, ring bus or tree connection may be used. A communication network consists of nodes,
which in our case are sensors, each of which has computing power and can transmit and
receive messages over communication links, wireless or cabled.
8.5 COMMUNICATION PROTOCOLS AND ROUTING
In a wireless sensor network, one can implement different types of communication protocols
and routing techniques. The protocol employed depends on the application in which the
sensor is meant to be used. A basic communication pro-tocol consists of packets of data
which has a header for identification, data bits and also some special frames to identify and
19. 19
correct errors in transmission. When a sensor node desires to transmit a message,
handshaking protocols are implemented with the destination node to improve reliability and
ultimately the QoS of the wireless network. This hand shaking protocol makes the sensor
node to retransmit messages that were not properly received. To use the extremely limited
resources effectively and efficiently, a new technique called CodeBlue is implemented in
wireless networks in order to cope up with the sensor nodes which have limited
communication and computation capabilities. The CodeBlue integrates sensor nodes and
other wireless devices in the network, thus performing various tasks, such as device
discovery - naming, routing, prioritization of critical data, security and tracking device
locations. The inventors designed Code Blue for rapidly changing, critical care environments.
It acts as an “Information Plane”, letting various devices detect each other, report events, and
establish communication channels. For medical applications, Code Blue is designed to scale
across a wide range of network densities, ranging from sparse clinic and hospital
deployments to very dense, ad hoc deployments at a mass casualty site. CodeBlue must also
operate on a range of wireless devices, from resource-constrained motes to more powerful
PDA and PC-class systems. The main advantage of this kind of structure is, it incorporates a
flexible naming scheme, robust publish and subscribe routing framework; authentication and
encryption provisions and handoff. The other services the Code Blue provides to the network
are location tracking, in-network filtering and aggregation.
8.6 POWER MANAGEMENT
Since the wireless sensors are geographically distributed, often in remote sites, the lifetime
of the sensor nodes is important. Power generation, power conservation and power
management play very important roles in extending the lifetime of the motes. Most of the
power is consumed in the process of RF communication since the required transmission
power increases as the square of the distance between source and destination. While software
power management techniques can greatly decrease the power consumed by RF sensor
nodes, TDMA is especially useful for power conservation, since a node can power down
between its assigned time slots, waking up in time to receive and transmit messages.
8.7 NETWORK COVERAGE
20. 20
The coverage area of the sensor is defined as the effective range of the sensor connected to its
sensor node. In a network, high coverage makes it robust system and this can be exploited to
extend the network lifetime by switching redundant nodes to power-saving and sleep modes.
9. SYSTEM TESTING AND EXPERIMENTAL DATA ANALYSIS
The system uses the moving target detection algorithm to achieve the targets of the
surveillance image processing and abnormal judgment. Accounting for 7.5 ‰ background of
the small target the system can identify. The effective elimination of the system for
environmental changes in light, change the background small goals gradual movement caused
by factors, such as system misjudgment.
Figure 3 is the use of the system hardware and software for the intrusion detection and
testing experimental picture effect.
The results show that, without obstruction in the transmission distance less than 60 m, the
transmission of data packet loss rate is zero. The Test Data with No Obstruction is shown . It
can fully meet the normal home environment for the communication needs, with a low
power; therefore it is very suitable for family use. If there are two cement walls between two
ZigBee modules in 30 m distance, packet loss rate is only 1 percent. And if there is one
cement wall, the rate is zero, which can completely meet the requirement of system design.
10. CURRENT & FUTURE DEVELOPMENTS
21. 21
The reported inventions on home monitoring are based on different sensors, collection of
sensors data by a central processor, comparison of activities with a standard pattern and
detection of unusual or abnormal event. In many situations, the cameras are used for security
surveillance which may be appropriate but in home monitoring applications the privacy is not
protected. The cost of the complete system may be a critical factor for its universal use. In
future, the research should be targeted to develop a low-cost system with the sensors essential
to monitor the elder people at home. The time to detect any abnormal or unusual incident
should be detected as fast as possible and the message to the caregiver should reach as
quickly as practicable.
11. PROPOSED WORK
In this project automation of an entire building is controlled using zigbee. This is new
standard designed for automation and control network.
The standard is aiming to be low cost,low power solutions for systems consisting of
devices in house,factories and offices.
In the transmitter section three sensors namely gas sensor,temperature sensor and PIR
sensor are connected for sensing the gas leakage,excess temperature and human
presence. The sensors connected detect the changes occuring in the environment.
When any changes are detected the microcontroller transmits the signal through
zigbee which could be analyzed through the pc with help of a camera and also a
message is sent to the user through GSM.
12.CONCLUSION
This paper presents one solution for establishing a lowpower consumption remote home
security alarm system. The system, based on WSN and GSM technology, can detect the theft,
leaking of raw gas and fire, and send alarm message remotely. The hardware of this system
includes the single chipC5081F310, wireless receiving and sending chip CC1100 as well as
the SIMENS TC35 GSM module. The system software developed in C51 language has the
ability of collecting, wireless receiving and transmitting data, and can send a piece of alarm
22. 22
short message to the user’s mobile phone when some dangerous condition has been detected.
With the advantages of reliability, easy usage, complement wireless, and low power
consumption, the system also has practical value in other fields.
This paper presents the design and completion of a ZigBee based smart home security
monitoring system, respectively, from the system, hardware design, software design,
experimental data analysis and other aspects of the ZigBee technology in the application of
the system. ZigBee technology will be applied in the intelligent home to achieve a rapid rate,
low-cost, low-power wireless communication network.
Through connecting the traditional sensor alarm system and image monitoring system, a new
type of smart security system is formed. Users can use the phone or PC to receive MMS
information. According to the need, users can set the mobile phone to achieve a flexible and
convenient home security monitoring.
13.REFERENCES
JOURNALS:
1.Pacific-Asia Conference on Circuits,Communications and System: Anan Fang, Xiaoling
Xu, Wenling Yang,Li Zhang Electronic Department of Information Engineering School ,
Nan Chang University, pp 23-30, 2009
2. Y. Zhao and Z. Ye: “A Low Cost GSM/GPRS Based Wireless Home Security System ”,
pp 56-62, 2008
3. Johan Lö, Jonas Olsson: “ZigBee for wireless networking”, pp 07-15, 2005
WEBSITES:
1. http://www.ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5480767
2. http://www.computer.org/csdl/proceedings/nswctc/2010/4011/01/4011a535
3. http://www. homeguides.sfgate.com › ... › First Time Home Buyer Checklist
4. http://www.safewise.com/home-security-faq/how-do-security-systems-work